Formal requirements for virtualizable third generation architectures
Communications of the ACM
Xen and the art of virtualization
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Terra: a virtual machine-based platform for trusted computing
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
ReVirt: enabling intrusion analysis through virtual-machine logging and replay
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor
ACSAC '05 Proceedings of the 21st Annual Computer Security Applications Conference
SubVirt: Implementing malware with virtual machines
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
A self-organizing flock of Condors
Journal of Parallel and Distributed Computing
Virtual workspaces: Achieving quality of service and quality of life in the Grid
Scientific Programming - Dynamic Grids and Worldwide Computing
Performance and security lessons learned from virtualizing the alpha processor
Proceedings of the 34th annual international symposium on Computer architecture
Policy-Based Access Control in Peer-to-Peer Grid Systems
GRID '05 Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing
Towards a VMM-based usage control framework for OS kernel integrity protection
Proceedings of the 12th ACM symposium on Access control models and technologies
Managing the risk of covert information flows in virtual machine systems
Proceedings of the 12th ACM symposium on Access control models and technologies
vTPM: virtualizing the trusted platform module
USENIX-SS'06 Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
A user-mode port of the linux kernel
ALS'00 Proceedings of the 4th annual Linux Showcase & Conference - Volume 4
Automatic grid assembly by promoting collaboration in peer-to-peer grids
Journal of Parallel and Distributed Computing
Trust overlay networks for global reputation aggregation in P2P grid computing
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Editorial: Special section: Peer-to-peer grid technologies
Future Generation Computer Systems
Editorial: Special Section: P2P and internet computing
Future Generation Computer Systems
A secure broadcasting cryptosystem and its application to grid computing
Future Generation Computer Systems
Future Generation Computer Systems
Hi-index | 0.00 |
P2P grid is a natural merger of grid computing and P2P computing. Currently, P2P grids are hard to be commercially adopted because user programs and sensitive data are compromised easily and no trusted execution environment is provided on P2P grid nodes. Virtualization technologies become more and more popular, which allows one computer system to function as multiple virtual systems. When a P2P grid node is equipped with virtualization technologies, the virtual machine monitor (VMM) under the operating system is more secure than the OS because the VMM is much less complicated than the OS, and trusted platform module (TPM) embedded into the underlying hardware can provide integrity protection for the VMM. In this paper, we introduce how to construct a trusted execution environment on P2P grid nodes equipped with secure VMM. The VM images used for deploying virtual execution environment are protected and verified. A VM image will be selected and deployed onto a P2P grid node according to the job requirement and node situation, such as node performance and node reputation. Finally, the overhead of trusted image store and deployment is analyzed.